Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Following is a problem from Computer Networking: A Top-Down Approach (6 th Editi

ID: 3534007 • Letter: F

Question

Following is a problem from Computer Networking: A Top-Down Approach (6th Edition) chapter 8 problem 21:

Suppose Alice and Bob are communicating over an SSL session. Suppose an attacker, who does not have any of the shared keys, inserts a bogus TCP segment into a packet stream with correct TCP checksum and sequence numbers (and correct IP addresses and port numbers). Will SSL at the receiving side accept the bogus packet and pass the payload to the receiving application? Why or why not?

I am looking for both the answer and the answer to "why or why not."

Explanation / Answer

the correct wanswer is NO


reason-


SSL sends records, each of which includes a message digest. To create

the message digest, one needs a shared key, which the attacker doesn